Skip to main content

About your Search

KRON (MyNetworkTV) 2
( more )
English 100
Search Results 70 to 94 of about 101 (some duplicates have been removed)
that while the national security agency has a big dog, it's an important participant. i used to work there. very supportive of it. but everyone in the country needs to be reassured that when we're talking about cybersecurity, it's d.h.s. that's setting the policy and dealing with the data, not the national security agency. so what i would say is maybe d.h.s. doesn't need so much a bigger dog as a leash. and authorizing legislation can provide that kind of reassurance to the american people. >> thank you for those comments. how do we better honor the loss of all those lives 2 years ago 12 years ago this morning? do we join some of our colleagues on the steps of the capitol for an observance or do we better honor their lives and their loss by continuing to do our work here today? we believe the best way is for us to continue doing that. we'll continue going through the 11:00 hour and give us a chance to really drill down on some of these important issues. with that having been said, let me yield to dr. coburn. >> well, thank you, mr. chairman. couple points on what i heard here today. the ho
, according to the importance that they you know ascribe to it for national security. so sure. the agencies sometimes overclassify things. but if it's top crest cod -- top secret code word, you believe it to be top secret. who owns those secrets? the government owns those secrets. for the better good al qaeda is plotting a major attack or that syria has deployed the syrian regime has deployed some chemical weapons or something, that's fine, they own that information and they decide to reveal it. of course there is discourse whether it's going to hample the capabilities - marm the capability of the nsa or otherwise. >> i don't have the republic article -- >> i was mistaken. it was -- >> it was the republica explanation of what happened. >> i'm sorry. >> why don't we go back to it and finish it off so you hear it. it said that it's certainly true that some number of bad actors possibly including would be terrorists, law enforcement or intelligence agencies. some of these bad actors may now change their behavior in response to our story. so again as to what richard was saying, doesn't that wor
think. published reports now say the national security agency has used supercomputers to bypass or in some cases crack online encryption tools. the revelation comes from documents leaked by former nsa contractor edward snowden. the government has reportedly spent billions to access online secrets. >>> and we have some breaking news overseas. one of the most wanted terrorists from the war in afghanistan has reportedly been killed in a u.s. drone strike. u.s. officials believe mullah sangeen zadran organized attacks on u.s. troops and helped capture bergdahl. in 2009. >>> and some important news about the economy. the government has just put out the monthly jobs report this morning but not everyone was hoping for good news. abc's rebecca jarvis is here to explain that. >>> josh, good morning. so much riding on this report. putting everyone back to work in america. americans will pay more to borrow from the cost of a mortgage to a car loan. the economy added 169,000 jobs in august. unemployment ticked a little lower to 7.3%. overall it was still weaker that many were expected. what
to another war. >> there were new revelations on the extent of the national security agency's ability to monitor encrypted internet communications, the adage, it isn't paranoia if they're really out to get you. that adage seems especially relevant. have t have the nsa disclosures given fuel to the conspiracy theorists? >> even beyond that, the flip side is there's been a lot of paranoia within the government about leakers. and you have people being asked to look at federal -- fellow federal employees to see if they're exhibiting supposed signs of possibly revealing classified information and this whole sort of enemy within paranoia enveloping the people at the top of the social hierarchy as well as at the bottom. >> in your book, you also trace the history of conspiracy theories. what were the earliest widely believed conspiracy theories in this country? >> it goes back to the colonial days. conspiracies about indians and about satan being the manipulator that brought indians to the country because he wanted his own empire here. and also fear of indian attacks. there was the salem wit
have your high-tech kind of well-known national security agencies that deal with threats that are global, when you are dealing with local threats and lone wolves, it is police boots on the ground, local folks, community leaders who have got to be part of the process of identifying threats. >> right here. right here, second row. >> mr. secretary, i wanted you to address the boston marathon. you said communication is key but in that situation one problem was communication between certain departments and government and certain governments. >> the full facts are not in and i do not want to speculate. you have to look at this in several stages. one set of questions will be, why? somehow they lost track of tsarnaev, the older one, when he went over to chechnya and was over there for a few months. why there was not an alert on that? why was the russian warning did not integrated or taken seriously? the second set of issues is whether within the u.s. government where people did have warning, how come they did not pursue further communication? i do not know the answer but that's a
on americans. for three years the national security agency violated rules set down by federal judges covering how the agency was allowed to use mass collected data of every telephone call made in the united states according to the more than 1800 pages of declassified documents the obama administration released yesterday. that in the papers this morning. as alexander bolton was talking about, commerce must deal with budget issues now that they are back from their august recess. "the washington post" says fight the budget bill, reporting house republican leaders unveiled a plan tuesday to keep the government (september 30, but they were scribbling to build support within their own ranks after conservatives savaged the proposal for failing to define the president obama's health initiative. the plan, as presented to the party's rank-and-file in a closed-door meeting tuesday morning, calls for the government to be funded at current levels through december 15, continuing a sharp budget cuts known as sequester. by the way, heritage action, which is now being run by former senator jim demint, republi
the vice president, heads of the c.i.a., national security agency and the f.b.i. and also new york governor pataki after the two attacks on the twin towers in new york. he was briefed by his national security advisor, condoleeza rice, who phoned him after the first attack. mr. bush was reading to some children when the second attack occurred. chief of staff andy card interrupted him, told him about the attack. it was clear at that point we were dealing with terrorists. >> i want to bring in to the conversation general al hague, the former secretary of state. general hague, at a time like this, how does america respond prudently, with the proper amount of caution, and yet with whatever force needs to be applied? >> first we have to know the full limits of this tragedy and it's unprecedented, of course. but we have to stay above all united and calm and ready to take resolute action which sometimes we have failed to do in the recent past. when the perpetrators are uncovered and we have many, many indicators of precisely who they are -- this was too broadly based a terrorist act to be just a fe
department, state department, national security agency, have all rejected or failed to answer multiple freedom of information requests made by cbs news as well as appeals of the denials. the agency cite exemptions relating -- related to ongoing investigations of national security. an article today by john sexton talking about it's been nearly a year since the attack which killed four americans in benghazi. during that time various minute-by-minute accounts of the attack have been published. in addition, the administration's decisions to refuse additional security requests and to revise its talking points after the attack have been examined in detail. further down it says, the general outlines of the c.i.a. effort have been reported. one fact, which has not been highlighted, is that the u.n. arms embargo of libya, which the united states helped pass in 2011, makes shipping weapons in or out of the country, libya, a violation of international law. indeed, the way the u.n. resolution is written, even knowingly allowing such shipments to take place may be violation of the agreement. yet, w
national security agency and they came to my office. we privately met and i said tell me the living dead was involved in this meeting. tell me what is the bottom-line of the security aspect? they went ahead and looked at this and we went into a skiff room which is in the capital and that's it private room. i won't reveal the information on the security to the capital but it's okay to do these if we do it in this way. the israeli-based company or the lg sees her american company it doesn't matter which one. if we do it this way it's involved this way and that's all i can say about it. we made a decision to award the contract. what we did with the contract is it went through j. eagan in the administrative house. we have to providers do a survey. the providers were stripped verizon and at&t. there were five of them. they would sign off ltc or do you want foxconn? the majority said they wanted foxconn. there's one little twist in this though. at one point in time the word was used and this is how i met with foxconn. i had many jewish friends. in israel and israelis israeli will say i am jewi
security worldwide due to 9/11. the national security agency repeatedly ignored court-ordered procedures by tracking thousands of phone calls without suspecting they could be connected to terrorism. that according to records released by the obama administration. these violations took place for three years until they were discovered in 2009. >>> out west, firefighters are indeed getting a handle on the mt. diablo wildfire. officials believe they could have that fire contained by the weekend. it's burned some 3200 acres. >>> now, making matters worse, burglars got into a firehouse while crews were out fighting the flames. thieves stole wedding rings, watches and computers. >>> two colorado lawmakers booted out in a recall election after supporting tougher gun control. john morse and angela guerin lost. the measures faced opposition even after last year's movie theater shooting in colorado. >>> police in gardendale, alabama, a raccoon crashed through their ceiling. it invaded the gardendale police department, was in no murray to leave. he first held on to an inside door, then he later tried
at the cia. apparently the cia has been evacuated. we know the national security agency which is the electronic eavesdropping agency which is south of baltimore, near ft. meade, maryland that they have been shut down. what we're hearing from both places is that all non-essential personnel have been told to leave. i can only imagine that probably they are trying to move some of their operations out of those buildings as well for backup procedure. but in addition to whatever intelligence was missed in all of this we now have perhaps some problems gathering intelligence as those builds are now being shut down. >> jamie, thank you very much. tom, let's go back and talk about something you mentioned a second ago that is just -- it shows the enormity of this situation in addition to what we assume will be horrendous loss of life. all planes in this country have been grounded. you think about the impact that has. is there ever a time we can imagine something like that ever happening before? >> the most powerful nation in the world and national security officia
the information in documents leaked by former national security agent edward snowden. >> reporter: the u.s. cyberspy agency has cracked many of the codes a that are meant to keep internet information private. since contractor edward snowden, the nsa has invested billions of dollars to break encrypted communications including banking transactions, consumer e-commerce, medical records and other ostensibly confidential information. they forced technology companies to provide keys to their inscription programs to e-mails and chats in the u.s. and across the world. the government communications headquarters, the agency boasted of an aggressive multi-pronged effort to break widely used interrupt encryption technologies saying that fast amountvastamounts of online datw being exploited. the british agency reported they had developed access opportunities to google's encrypted traffic. there are over 400 us 400 millis of g mail, and include yahoo, facebook and hot mail. the information from eric snowden has been shared with the guardian and others. the new poll released by the pew research systems
in finding and stopping him before he could further damage national security. together with the air force, u.s. customs, irs, and other agencies will build a strong case against him, and this past january, he was sentenced to 32 years in prison. foreign spies know that military superiority is merely one factor that determines the world's balance of power. just as important is the kind of economic innovation we find here in the bay area. so it is no surprise that spies also target the most valuable secrets of american companies. as well as universities. they hope that stealing the fruits of american innovation will give their nation's a shortcut to economic pre- eminence. an example of the cost of this type of espionage -- a former scientist for two of america's largest agricultural companies pled guilty to charges that he sent trade secrets to his native china. he became a research leader in biotechnology and the development of organic pesticides. although he had signed non- disclosure agreements, he transferred stolen trade secrets from both companies to persons in germany and china, and hi
? and why are questions involving his death met with silence? tonight, fault lines examines the nations largest law enforcement agency and asks who is holding them accountable when they pull the trigger. >> people here call this ambos nogales, or both nogales. but a steel fence built in the name of national security divides this border town. i've come to meet jose's family they live just blocks from where jose was killed. >> his brother diego worked at a shop in the center of town. jose would often meet him to help mop the floor before closing. that night, he never made it. jose antonio was shot to death, right on this street corner. the walls on this doctors office are still riddled with bullet holes. now, the border patrol's explanation for what happened hinges on the fact they say their agents were threatened by somebody throwing rocks on this side of the fence. but standing here, the first thing you ask yourself is: could a 16 year old boy really threaten somebody standing on top of what's at least a 20 foot cliff, and on the other side of that fence? whatever took place here that n
the security agency saying that collecting phone records could allow the registration of guns or gun owners. never mind that the very same nra secretly collected data on millions of americans in order to lobby against gun safety laws, as buzzfeed reported last month the gun lobby has built a massive secret data base of tens of millions of americans, including people who are not members of the nra, and uses that database to boost membership and promote political causes. david corn, which is, what is worse here the nsa's database or the nra's? >> i won't get to the hypocrisy argument because that's too obvious. the key thing is the nra is joining this lawsuit because they say if the nsa has your phone records the government can go in and see if you're calling a gun store to place an order, and therefore create a gun -- a gun owner's registry which is the nuttiest paranoid conspiracy but the whole organizing campaign of the nra, the organizing principle, is conspiracy and paranoia, you know, really -- >> and sales. and sales. >> exactly. but they can also take all of that data, marketing data,
we're under surveillance that. is a terrible thi. >> the report says the national security been unraveling making nearly everyone's secrets vibl available to the government. >> good buy, washington hello bay area for janet napolitano. vice president biden led a ceremony today for napolitano. it's a post held four and a half years. the vice president thanked napolitano for service and believes she will be back in washington some day. >> i think janet shld nbt supreme court of the united states. and that not only speaks to other kaults but your depth and knowledge. >> napolitano leaving her post to becom the first female president of the uc system based in oakland. >> coming up, storyf the hammocks that ner arrived. >> how a company ♪ take me into your darkest hour ♪ ♪ and i'll never desert you ♪ ♪ i'll stand by you yeaaaah! yeah. so that's our loyalty program. you're automatically enrolled, and the longer you stay, the more rewards you get. great! oh! ♪ i'll stand by you ♪ won't let nobody hurt you ♪ isn't there a simpler way to explain the loyalty program? yes. s
agencies are compromising online privacy for the sake of national security. the documents state that the nsa and its british counterpart, the government communications headquarters or gchq have been heading a secret deaded a lo de effort. they're using computers to crack web encryption coats through brute force and inserted secret back doors to access information they would normally be barred from thanks to digital scramb scrambling. it has reportedly cost the agency $225 million, just this year, and is designed to insert certain weak points into security systems that would be known only to the nsa itself. the problem is, as the times points out, these codes guard global commerce and banking systems, p systems, protect sensitive data and secures web searches, internet chats and phone calls of billions of people around the world. who could say what would happen if they fell into the wrong hands. the documents do not name specific companies or technologies, but they're reportedly working to penetrate encrypted traffic on what it calls the big four service providers, google, yahoo!
backward it shouldn't j jeopardize national security. google also filed its own amendment to it's version of the motion and google has reached an inpass to the government. >> die nan macedo, thanks. >> you want to know where the happiest place on earth is patti ann? >> we are going to give you a hint not disney world. we will tell you where the place is. >> are you about to brush your teeth after eating your breakfast. there might be a reason you might want to wait. first let's check in with brian kilmeade who brushed his teeth this morning i am sure. >> and you cannot have wings on the bone without sauce i should give it out. demand boneless wings. we will discuss that for next three hours. if you have time talking to senator joe mansion and discuss his alternative for election in syria. john kerry strumbling into one yesterday. michael mccall about why he believes syria could lead to a larger war then we will have fun with dancing with fun with danch the stars judge. say did i robertson is here for fashion week. we have comedian curt fox all coming up on "fox & friends." so what can i g
as the national security council are working with the appropriate people. i have confidence that we will be able to come up with a mutually agreed upon resolution to accomplish the objective. >> thank you, mr. chairman. secretary kerry and secretary hagel, the -- maybe you can comment to this. i believe the that american credibility on the international stage hangs in the balance, and while it is crucial to make sure that assad never uses chemical weapons again, i believe there's something bigger at stake, that is, the message to iran as they continue to pursue a nuclear capability. they're watching how we respond to the assad regime's crossing of the president fuzzy red line, and the world is also aware that president obama is -- the president's red line, and the world is also aware that president obama is seeking to stop weapons of mass destruction. how do you think the calculus on the nuclear program will change based on what we do now? >> congressman, there's an enormous amount of question in the region, not just by iranians, but by emer rodis, sort -- the saudis, the kuwaitis, as to whether
at this table as well as the national security council are working with the appropriate people. i have confidence that we will be able to come up with a mutually agreed upon resolution to accomplish the objective. >> thank you, mr. chairman. secretary kerry and secretary the -- maybe you can comment to this. i believe the that american credibility on the international stage hangs in the balance, and while it is crucial to make sure that assad never uses chemical weapons again, i believe there's something bigger at stake, that is, the message to iran as they continue to pursue a nuclear capability. they're watching how we respond to the assad regime's crossing of the president fuzzy red line, and the world is also aware that president obama is -- the president's red line, and the world is also aware that seeking tobama is stop weapons of mass destruction. think the calculus on the nuclear program will change based on what we do now? >> congressman, there's an enormous amount of question in the region, not just by iranians, but by emer rodis, sort -- the saudis, the u.s.tis, as to whethe
, while there were efforts to enhance border security, no agency of the u.s. government thought of counterterrorism as an arsenal. after 19 hijackers got the ease of a visa, border security is not considered a cornerstone of national security policy. we believe for reasons we will discuss in the following pages it should be made one. this is the 9/11 commission staff report on terrorist travel. so it's remarkable to me that the politicians in washington and in the administration debating whether or not we need to enforce the immigration laws and secure the borders while we face the continuing threat of terrorism, the continuing growth of transnational drug trafficking organizations in the united states, and we're being told the border is secure. the one metric, and i want everyone out there to think about this, because we're being told that when i was on with neil cavuto, he said the border patrol is down, mike, but that would mean it's not much of a problem. i'm trying to figure out how many illegals are here based on arrests is like taking attendance and asking people not pres
Search Results 70 to 94 of about 101 (some duplicates have been removed)